Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-47383

Summary
Assigner-qualcomm
Assigner Org ID-2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At-02 Mar, 2026 | 16:53
Updated At-03 Mar, 2026 | 04:56
Rejected At-
Credits

Missing Cryptographic Step in Data Modem

Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:qualcomm
Assigner Org ID:2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At:02 Mar, 2026 | 16:53
Updated At:03 Mar, 2026 | 04:56
Rejected At:
▼CVE Numbering Authority (CNA)
Missing Cryptographic Step in Data Modem

Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE.

Affected Products
Vendor
Qualcomm Technologies, Inc.Qualcomm, Inc.
Product
Snapdragon
Platforms
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon MDM
  • Snapdragon Mobile
  • Snapdragon WBC
  • Snapdragon Wearables
Default Status
unaffected
Versions
Affected
  • 5G Fixed Wireless Access Platform
  • 9206 LTE Modem
  • 9207 LTE Modem
  • APQ8098
  • AQT1000
  • AR8035
  • C-V2X 9150
  • CSRA6620
  • CSRA6640
  • CSRB31024
  • FastConnect 6200
  • FastConnect 6700
  • FastConnect 6800
  • FastConnect 6900
  • FastConnect 7800
  • FSM100 Platform
  • FWA Gen 3 Ultra Platform
  • G1 Gen 1
  • MDM8207
  • MDM9250
  • MDM9628
  • MDM9640
  • Milos
  • Netrani
  • Orne
  • Palawan25
  • QCA6174A
  • QCA6391
  • QCA6420
  • QCA6430
  • QCA6564A
  • QCA6564AU
  • QCA6574
  • QCA6574A
  • QCA6574AU
  • QCA6584
  • QCA6584AU
  • QCA6595AU
  • QCA6678AQ
  • QCA6688AQ
  • QCA6696
  • QCA6698AQ
  • QCA6698AU
  • QCA6797AQ
  • QCA8081
  • QCA8337
  • QCA9367
  • QCA9377
  • QCC710
  • QCM2290
  • QCM4325
  • QCM4490
  • QCM5430
  • QCM6125
  • QCM6490
  • QCN6024
  • QCN6224
  • QCN6274
  • QCN9011
  • QCN9012
  • QCN9024
  • QCS2290
  • QCS4290
  • QCS4490
  • QCS8550
  • QEP8111
  • QFW7114
  • QFW7124
  • QMP1000
  • Qualcomm 215 Mobile Platform
  • Qualcomm Video Collaboration VC1 Platform
  • Qualcomm Video Collaboration VC3 Platform
  • Robotics RB2 Platform
  • SD 8 Gen1 5G
  • SD626
  • SD662
  • SDA660
  • SDM429W
  • SDX57M
  • SDX61
  • SDX71M
  • SM6225P
  • SM6250
  • SM6650P
  • SM7325P
  • SM7435
  • SM7550
  • SM7550P
  • SM7635P
  • SM7675
  • SM7675P
  • SM8475P
  • SM8550P
  • SM8635
  • SM8635P
  • SM8650Q
  • SM8750P
  • Smart Display 200 Platform
  • Snapdragon 1100 Wearable Platform
  • Snapdragon 1200 Wearable Platform
  • Snapdragon 4 Gen 1 Mobile Platform
  • Snapdragon 4 Gen 2 Mobile Platform
  • Snapdragon 429 Mobile Platform
  • Snapdragon 460 Mobile Platform
  • Snapdragon 480 5G Mobile Platform
  • Snapdragon 480+ 5G Mobile Platform
  • Snapdragon 6 Gen 1 Mobile Platform
  • Snapdragon 6 Gen 3 Mobile Platform
  • Snapdragon 6 Gen 4 Mobile Platform
  • Snapdragon 625 Mobile Platform
  • Snapdragon 626 Mobile Platform
  • Snapdragon 660 Mobile Platform
  • Snapdragon 662 Mobile Platform
  • Snapdragon 680 4G Mobile Platform
  • Snapdragon 685 4G Mobile Platform
  • Snapdragon 690 5G Mobile Platform
  • Snapdragon 695 5G Mobile Platform
  • Snapdragon 7 Gen 1 Mobile Platform
  • Snapdragon 7+ Gen 2 Mobile Platform
  • Snapdragon 778G 5G Mobile Platform
  • Snapdragon 778G+ 5G Mobile Platform
  • Snapdragon 782G Mobile Platform
  • Snapdragon 7c Compute Platform
  • Snapdragon 7c Gen 2 Compute Platform "Rennell Pro"
  • Snapdragon 7c+ Gen 3 Compute
  • Snapdragon 7s Gen 3 Mobile Platform
  • Snapdragon 8 Elite
  • Snapdragon 8 Gen 1 Mobile Platform
  • Snapdragon 8 Gen 2 Mobile Platform
  • Snapdragon 8 Gen 3 Mobile Platform
  • Snapdragon 8+ Gen 1 Mobile Platform
  • Snapdragon 8+ Gen 2 Mobile Platform
  • Snapdragon 820 Automotive Platform
  • Snapdragon 820Am
  • Snapdragon 865 5G Mobile Platform
  • Snapdragon 865+ 5G Mobile Platform
  • Snapdragon 870 5G Mobile Platform
  • Snapdragon 888 5G Mobile Platform
  • Snapdragon 888+ 5G Mobile Platform
  • Snapdragon 8c Compute Platform "Poipu Lite"
  • Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite"
  • Snapdragon 8cx Compute Platform
  • Snapdragon 8cx Compute Platform "Poipu Pro"
  • Snapdragon 8cx Gen 2 5G Compute Platform
  • Snapdragon 8cx Gen 2 5G Compute Platform "Poipu Pro"
  • Snapdragon Auto 5G Modem-RF
  • Snapdragon Auto 5G Modem-RF Gen 2
  • Snapdragon W5+ Gen 1 Wearable Platform
  • Snapdragon X12 LTE Modem
  • Snapdragon X32 5G Modem-RF System
  • Snapdragon X35 5G Modem-RF System
  • Snapdragon X5 LTE Modem
  • Snapdragon X53 5G Modem-RF System
  • Snapdragon X55 5G Modem-RF System
  • Snapdragon X65 5G Modem-RF System
  • Snapdragon X70 Modem-RF System
  • Snapdragon X72 5G Modem-RF System
  • Snapdragon X75 5G Modem-RF System
  • Snapdragon X80 5G Modem-RF System
  • SnapdragonAuto 4GModem
  • SW5100
  • SW5100P
  • SW6100
  • SW6100P
  • Themisto
  • Vision Intelligence 100 Platform
  • Vision Intelligence 200 Platform
  • Vision Intelligence 400 Platform
  • WCD9306
  • WCD9326
  • WCD9330
  • WCD9335
  • WCD9340
  • WCD9341
  • WCD9360
  • WCD9370
  • WCD9371
  • WCD9375
  • WCD9378
  • WCD9380
  • WCD9385
  • WCD9390
  • WCD9395
  • WCN3615
  • WCN3620
  • WCN3660B
  • WCN3680B
  • WCN3910
  • WCN3950
  • WCN3980
  • WCN3988
  • WCN3990
  • WCN6650
  • WCN6755
  • WCN7860
  • WCN7861
  • WCN7880
  • WCN7881
  • WSA8810
  • WSA8815
  • WSA8830
  • WSA8832
  • WSA8835
  • WSA8840
  • WSA8845
  • WSA8845H
Problem Types
TypeCWE IDDescription
CWECWE-325CWE-325: Missing Cryptographic Step
Type: CWE
CWE ID: CWE-325
Description: CWE-325: Missing Cryptographic Step
Metrics
VersionBase scoreBase severityVector
3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
N/A
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:product-security@qualcomm.com
Published At:02 Mar, 2026 | 17:16
Updated At:02 Mar, 2026 | 20:29

Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-325Primaryproduct-security@qualcomm.com
CWE ID: CWE-325
Type: Primary
Source: product-security@qualcomm.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.htmlproduct-security@qualcomm.com
N/A
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
Source: product-security@qualcomm.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1Records found

CVE-2022-29229
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.10% / 27.18%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 20:55
Updated-23 Apr, 2025 | 18:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Cryptographic Step in cassproject

CaSS is a Competency and Skills System. CaSS Library, (npm:cassproject) has a missing cryptographic step when storing cryptographic keys that can allow a server administrator access to an account’s cryptographic keys. This affects CaSS servers using standalone username/password authentication, which uses a method that expects e2e cryptographic security of authorization credentials. The issue has been patched in 1.5.8, however, the vulnerable accounts are only resecured when the user next logs in using standalone authentication, as the data required to resecure the account is not available to the server. The issue may be mitigated by using SSO or client side certificates to log in. Please note that SSO and client side certificate authentication does not have this expectation of no-knowledge credential access, and cryptographic keys are available to the server administrator.

Action-Not Available
Vendor-cassprojectcassproject
Product-competency_and_skills_systemCASS
CWE ID-CWE-325
Missing Cryptographic Step
Details not found